Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-39685
Vulnerability from cvelistv5
Published
2022-03-16 14:04
Modified
2024-08-04 02:13
Severity ?
EPSS score ?
Summary
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
References
▼ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/2022-03-01 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2022-03-01 | Patch, Vendor Advisory |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:13:37.681Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://source.android.com/security/bulletin/2022-03-01", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Android", vendor: "n/a", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", value: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-16T14:04:07", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://source.android.com/security/bulletin/2022-03-01", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-39685", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Android kernel", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/2022-03-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/2022-03-01", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2021-39685", datePublished: "2022-03-16T14:04:07", dateReserved: "2021-08-23T00:00:00", dateUpdated: "2024-08-04T02:13:37.681Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-39685\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2022-03-16T15:15:10.377\",\"lastModified\":\"2024-11-21T06:20:00.253\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel\"},{\"lang\":\"es\",\"value\":\"En varios métodos de configuración del subsistema de gadgets USB, se presenta una posible escritura fuera de límites debido a una comprobación incorrecta de flag. Esto podría conllevar a una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. Producto: Android, Versiones: Android kernel, ID de Android: A-210292376, Referencias: kernel Ascendente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/2022-03-01\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2022-03-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", }, }
suse-su-2022:0370-1
Vulnerability from csaf_suse
Published
2022-02-11 07:36
Modified
2022-02-11 07:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Bluetooth: refactor malicious adv data check (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: refactor ns->ctrl by request (git-fixes).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: Add support for Brainboxes UC cards (git-fixes).
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2022-370,SUSE-SLE-Module-Basesystem-15-SP3-2022-370,SUSE-SLE-Module-Development-Tools-15-SP3-2022-370,SUSE-SLE-Module-Legacy-15-SP3-2022-370,SUSE-SLE-Module-Live-Patching-15-SP3-2022-370,SUSE-SLE-Product-HA-15-SP3-2022-370,SUSE-SLE-Product-WE-15-SP3-2022-370,SUSE-SUSE-MicroOS-5.1-2022-370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Bluetooth: refactor malicious adv data check (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- IB/cm: Avoid a loop when device has 255 ports (git-fixes)\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/isert: Fix a use after free in isert_connect_request (git-fixes)\n- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)\n- IB/mlx5: Add missing error code (git-fixes)\n- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)\n- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)\n- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- Input: wm97xx: Simplify resource management (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)\n- RDMA/core: Fix corrupted SL on passive side (git-fixes)\n- RDMA/core: Unify RoCE check and re-factor code (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)\n- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)\n- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)\n- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)\n- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)\n- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)\n- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)\n- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)\n- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)\n- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)\n- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)\n- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: serial: mos7840: fix probe error handling (git-fixes).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).\n- blk-mq: introduce blk_mq_set_request_complete (git-fixes).\n- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).\n- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- i40iw: Add support to make destroy QP synchronous (git-fixes)\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).\n- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).\n- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).\n- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).\n- nvme-tcp: fix data digest pointer calculation (git-fixes).\n- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).\n- nvme-tcp: fix memory leak when freeing a queue (git-fixes).\n- nvme-tcp: fix possible use-after-completion (git-fixes).\n- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).\n- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).\n- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).\n- nvme: introduce a nvme_host_path_error helper (git-fixes).\n- nvme: refactor ns->ctrl by request (git-fixes).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).\n- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).\n- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: Add support for Brainboxes UC cards (git-fixes).\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).\n- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).\n- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-370,SUSE-SLE-Module-Basesystem-15-SP3-2022-370,SUSE-SLE-Module-Development-Tools-15-SP3-2022-370,SUSE-SLE-Module-Legacy-15-SP3-2022-370,SUSE-SLE-Module-Live-Patching-15-SP3-2022-370,SUSE-SLE-Product-HA-15-SP3-2022-370,SUSE-SLE-Product-WE-15-SP3-2022-370,SUSE-SUSE-MicroOS-5.1-2022-370", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0370-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0370-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220370-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0370-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1177599", url: "https://bugzilla.suse.com/1177599", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1185377", url: "https://bugzilla.suse.com/1185377", }, { category: "self", summary: "SUSE Bug 1187428", url: "https://bugzilla.suse.com/1187428", }, { category: "self", summary: "SUSE Bug 1187723", url: "https://bugzilla.suse.com/1187723", }, { category: "self", summary: "SUSE Bug 1188605", url: "https://bugzilla.suse.com/1188605", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1193096", url: "https://bugzilla.suse.com/1193096", }, { category: "self", summary: "SUSE Bug 1193506", url: "https://bugzilla.suse.com/1193506", }, { category: "self", summary: "SUSE Bug 1193767", url: "https://bugzilla.suse.com/1193767", }, { category: "self", summary: "SUSE Bug 1193802", url: "https://bugzilla.suse.com/1193802", }, { category: "self", summary: "SUSE Bug 1193861", url: "https://bugzilla.suse.com/1193861", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1193867", url: "https://bugzilla.suse.com/1193867", }, { category: "self", summary: "SUSE Bug 1194048", url: "https://bugzilla.suse.com/1194048", }, { category: "self", summary: "SUSE Bug 1194227", url: "https://bugzilla.suse.com/1194227", }, { category: "self", summary: "SUSE Bug 1194291", url: "https://bugzilla.suse.com/1194291", }, { category: "self", summary: "SUSE Bug 1194880", url: "https://bugzilla.suse.com/1194880", }, { category: "self", summary: "SUSE Bug 1195009", url: "https://bugzilla.suse.com/1195009", }, { category: "self", summary: "SUSE Bug 1195062", url: "https://bugzilla.suse.com/1195062", }, { category: "self", summary: "SUSE Bug 1195065", url: "https://bugzilla.suse.com/1195065", }, { category: "self", summary: "SUSE Bug 1195073", url: "https://bugzilla.suse.com/1195073", }, { category: "self", summary: "SUSE Bug 1195183", url: "https://bugzilla.suse.com/1195183", }, { category: "self", summary: "SUSE Bug 1195184", url: "https://bugzilla.suse.com/1195184", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195267", url: "https://bugzilla.suse.com/1195267", }, { category: "self", summary: "SUSE Bug 1195293", url: "https://bugzilla.suse.com/1195293", }, { category: "self", summary: "SUSE Bug 1195371", url: "https://bugzilla.suse.com/1195371", }, { category: "self", summary: "SUSE Bug 1195476", url: "https://bugzilla.suse.com/1195476", }, { category: "self", summary: "SUSE Bug 1195477", url: "https://bugzilla.suse.com/1195477", }, { category: "self", summary: "SUSE Bug 1195478", url: "https://bugzilla.suse.com/1195478", }, { category: "self", summary: "SUSE Bug 1195479", url: "https://bugzilla.suse.com/1195479", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195481", url: "https://bugzilla.suse.com/1195481", }, { category: "self", summary: "SUSE Bug 1195482", url: "https://bugzilla.suse.com/1195482", }, { category: "self", summary: "SUSE CVE CVE-2020-28097 page", url: "https://www.suse.com/security/cve/CVE-2020-28097/", }, { category: "self", summary: "SUSE CVE CVE-2021-22600 page", url: "https://www.suse.com/security/cve/CVE-2021-22600/", }, { category: "self", summary: "SUSE CVE CVE-2021-39648 page", url: "https://www.suse.com/security/cve/CVE-2021-39648/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39685 page", url: "https://www.suse.com/security/cve/CVE-2021-39685/", }, { category: "self", summary: "SUSE CVE CVE-2021-44733 page", url: "https://www.suse.com/security/cve/CVE-2021-44733/", }, { category: "self", summary: "SUSE CVE CVE-2021-45095 page", url: "https://www.suse.com/security/cve/CVE-2021-45095/", }, { category: "self", summary: "SUSE CVE CVE-2022-0286 page", url: "https://www.suse.com/security/cve/CVE-2022-0286/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0435 page", url: "https://www.suse.com/security/cve/CVE-2022-0435/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-02-11T07:36:03Z", generator: { date: "2022-02-11T07:36:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0370-1", initial_release_date: "2022-02-11T07:36:03Z", revision_history: [ { date: "2022-02-11T07:36:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-al-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-al-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-altera-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-amd-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-apm-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-arm-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-lg-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-zte-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-syms-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-devel-5.3.18-150300.59.49.1.noarch", product_id: "kernel-devel-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-docs-5.3.18-150300.59.49.1.noarch", product_id: "kernel-docs-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-macros-5.3.18-150300.59.49.1.noarch", product_id: "kernel-macros-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-source-5.3.18-150300.59.49.1.noarch", product_id: "kernel-source-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-syms-5.3.18-150300.59.49.1.s390x", product_id: "kernel-syms-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_49-preempt-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_49-preempt-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_49-preempt-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-syms-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.49.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.49.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.49.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.49.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2020-28097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28097", }, ], notes: [ { category: "general", text: "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28097", url: "https://www.suse.com/security/cve/CVE-2020-28097", }, { category: "external", summary: "SUSE Bug 1187723 for CVE-2020-28097", url: "https://bugzilla.suse.com/1187723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2020-28097", }, { cve: "CVE-2021-22600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22600", }, ], notes: [ { category: "general", text: "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22600", url: "https://www.suse.com/security/cve/CVE-2021-22600", }, { category: "external", summary: "SUSE Bug 1195184 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195184", }, { category: "external", summary: "SUSE Bug 1195307 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "important", }, ], title: "CVE-2021-22600", }, { cve: "CVE-2021-39648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39648", }, ], notes: [ { category: "general", text: "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39648", url: "https://www.suse.com/security/cve/CVE-2021-39648", }, { category: "external", summary: "SUSE Bug 1193861 for CVE-2021-39648", url: "https://bugzilla.suse.com/1193861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2021-39648", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39685", }, ], notes: [ { category: "general", text: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39685", url: "https://www.suse.com/security/cve/CVE-2021-39685", }, { category: "external", summary: "SUSE Bug 1193802 for CVE-2021-39685", url: "https://bugzilla.suse.com/1193802", }, { category: "external", summary: "SUSE Bug 1194459 for CVE-2021-39685", url: "https://bugzilla.suse.com/1194459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "important", }, ], title: "CVE-2021-39685", }, { cve: "CVE-2021-44733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44733", }, ], notes: [ { category: "general", text: "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44733", url: "https://www.suse.com/security/cve/CVE-2021-44733", }, { category: "external", summary: "SUSE Bug 1193767 for CVE-2021-44733", url: "https://bugzilla.suse.com/1193767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2021-44733", }, { cve: "CVE-2021-45095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45095", }, ], notes: [ { category: "general", text: "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45095", url: "https://www.suse.com/security/cve/CVE-2021-45095", }, { category: "external", summary: "SUSE Bug 1193867 for CVE-2021-45095", url: "https://bugzilla.suse.com/1193867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2021-45095", }, { cve: "CVE-2022-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0286", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0286", url: "https://www.suse.com/security/cve/CVE-2022-0286", }, { category: "external", summary: "SUSE Bug 1195371 for CVE-2022-0286", url: "https://bugzilla.suse.com/1195371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2022-0286", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0435", }, ], notes: [ { category: "general", text: "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0435", url: "https://www.suse.com/security/cve/CVE-2022-0435", }, { category: "external", summary: "SUSE Bug 1195254 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195254", }, { category: "external", summary: "SUSE Bug 1195308 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195308", }, { category: "external", summary: "SUSE Bug 1226672 for CVE-2022-0435", url: "https://bugzilla.suse.com/1226672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "important", }, ], title: "CVE-2022-0435", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.49.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:36:03Z", details: "moderate", }, ], title: "CVE-2022-22942", }, ], }
suse-su-2022:0543-1
Vulnerability from csaf_suse
Published
2022-02-21 12:51
Modified
2022-02-21 12:51
Summary
Security update for the Linux RT Kernel
Notes
Title of the patch
Security update for the Linux RT Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Bluetooth: refactor malicious adv data check (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: refactor ns->ctrl by request (git-fixes).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: Add support for Brainboxes UC cards (git-fixes).
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2022-543,SUSE-SLE-Module-RT-15-SP3-2022-543,SUSE-SUSE-MicroOS-5.1-2022-543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux RT Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n\n \nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Bluetooth: refactor malicious adv data check (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- IB/cm: Avoid a loop when device has 255 ports (git-fixes)\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/isert: Fix a use after free in isert_connect_request (git-fixes)\n- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)\n- IB/mlx5: Add missing error code (git-fixes)\n- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)\n- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)\n- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- Input: wm97xx: Simplify resource management (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)\n- RDMA/core: Fix corrupted SL on passive side (git-fixes)\n- RDMA/core: Unify RoCE check and re-factor code (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)\n- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)\n- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)\n- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)\n- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)\n- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)\n- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)\n- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)\n- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)\n- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)\n- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)\n- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: serial: mos7840: fix probe error handling (git-fixes).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).\n- blk-mq: introduce blk_mq_set_request_complete (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).\n- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- i40iw: Add support to make destroy QP synchronous (git-fixes)\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).\n- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).\n- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).\n- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).\n- nvme-tcp: fix data digest pointer calculation (git-fixes).\n- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).\n- nvme-tcp: fix memory leak when freeing a queue (git-fixes).\n- nvme-tcp: fix possible use-after-completion (git-fixes).\n- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).\n- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).\n- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).\n- nvme: introduce a nvme_host_path_error helper (git-fixes).\n- nvme: refactor ns->ctrl by request (git-fixes).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).\n- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).\n- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: Add support for Brainboxes UC cards (git-fixes).\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).\n- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).\n- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-543,SUSE-SLE-Module-RT-15-SP3-2022-543,SUSE-SUSE-MicroOS-5.1-2022-543", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0543-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0543-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220543-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0543-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1177599", url: "https://bugzilla.suse.com/1177599", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1185377", url: "https://bugzilla.suse.com/1185377", }, { category: "self", summary: "SUSE Bug 1187428", url: "https://bugzilla.suse.com/1187428", }, { category: "self", summary: "SUSE Bug 1187723", url: "https://bugzilla.suse.com/1187723", }, { category: "self", summary: "SUSE Bug 1188605", url: "https://bugzilla.suse.com/1188605", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1193096", url: "https://bugzilla.suse.com/1193096", }, { category: "self", summary: "SUSE Bug 1193506", url: "https://bugzilla.suse.com/1193506", }, { category: "self", summary: "SUSE Bug 1193802", url: "https://bugzilla.suse.com/1193802", }, { category: "self", summary: "SUSE Bug 1193861", url: "https://bugzilla.suse.com/1193861", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1193867", url: "https://bugzilla.suse.com/1193867", }, { category: "self", summary: "SUSE Bug 1194048", url: "https://bugzilla.suse.com/1194048", }, { category: "self", summary: "SUSE Bug 1194227", url: "https://bugzilla.suse.com/1194227", }, { category: "self", summary: "SUSE Bug 1194291", url: "https://bugzilla.suse.com/1194291", }, { category: "self", summary: "SUSE Bug 1194880", url: "https://bugzilla.suse.com/1194880", }, { category: "self", summary: "SUSE Bug 1195009", url: "https://bugzilla.suse.com/1195009", }, { category: "self", summary: "SUSE Bug 1195065", url: "https://bugzilla.suse.com/1195065", }, { category: "self", summary: "SUSE Bug 1195073", url: "https://bugzilla.suse.com/1195073", }, { category: "self", summary: "SUSE Bug 1195183", url: "https://bugzilla.suse.com/1195183", }, { category: "self", summary: "SUSE Bug 1195184", url: "https://bugzilla.suse.com/1195184", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195267", url: "https://bugzilla.suse.com/1195267", }, { category: "self", summary: "SUSE Bug 1195293", url: "https://bugzilla.suse.com/1195293", }, { category: "self", summary: "SUSE Bug 1195371", url: "https://bugzilla.suse.com/1195371", }, { category: "self", summary: "SUSE Bug 1195476", url: "https://bugzilla.suse.com/1195476", }, { category: "self", summary: "SUSE Bug 1195477", url: "https://bugzilla.suse.com/1195477", }, { category: "self", summary: "SUSE Bug 1195478", url: "https://bugzilla.suse.com/1195478", }, { category: "self", summary: "SUSE Bug 1195479", url: "https://bugzilla.suse.com/1195479", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195481", url: "https://bugzilla.suse.com/1195481", }, { category: "self", summary: "SUSE Bug 1195482", url: "https://bugzilla.suse.com/1195482", }, { category: "self", summary: "SUSE CVE CVE-2020-28097 page", url: "https://www.suse.com/security/cve/CVE-2020-28097/", }, { category: "self", summary: "SUSE CVE CVE-2021-22600 page", url: "https://www.suse.com/security/cve/CVE-2021-22600/", }, { category: "self", summary: "SUSE CVE CVE-2021-39648 page", url: "https://www.suse.com/security/cve/CVE-2021-39648/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39685 page", url: "https://www.suse.com/security/cve/CVE-2021-39685/", }, { category: "self", summary: "SUSE CVE CVE-2021-45095 page", url: "https://www.suse.com/security/cve/CVE-2021-45095/", }, { category: "self", summary: "SUSE CVE CVE-2022-0286 page", url: "https://www.suse.com/security/cve/CVE-2022-0286/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, ], title: "Security update for the Linux RT Kernel", tracking: { current_release_date: "2022-02-21T12:51:27Z", generator: { date: "2022-02-21T12:51:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0543-1", initial_release_date: "2022-02-21T12:51:27Z", revision_history: [ { date: "2022-02-21T12:51:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150300.76.1.noarch", product: { name: "kernel-devel-rt-5.3.18-150300.76.1.noarch", product_id: "kernel-devel-rt-5.3.18-150300.76.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150300.76.1.noarch", product: { name: "kernel-source-rt-5.3.18-150300.76.1.noarch", product_id: "kernel-source-rt-5.3.18-150300.76.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt-devel-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt-extra-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt-optional-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt-optional-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-optional-5.3.18-150300.76.1.x86_64", product: { name: "kernel-rt_debug-optional-5.3.18-150300.76.1.x86_64", product_id: "kernel-rt_debug-optional-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150300.76.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150300.76.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150300.76.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150300.76.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150300.76.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150300.76.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150300.76.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP3", product: { name: "SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-150300.76.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-150300.76.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-150300.76.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-150300.76.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.76.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.76.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, ], }, vulnerabilities: [ { cve: "CVE-2020-28097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28097", }, ], notes: [ { category: "general", text: "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28097", url: "https://www.suse.com/security/cve/CVE-2020-28097", }, { category: "external", summary: "SUSE Bug 1187723 for CVE-2020-28097", url: "https://bugzilla.suse.com/1187723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2020-28097", }, { cve: "CVE-2021-22600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22600", }, ], notes: [ { category: "general", text: "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22600", url: "https://www.suse.com/security/cve/CVE-2021-22600", }, { category: "external", summary: "SUSE Bug 1195184 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195184", }, { category: "external", summary: "SUSE Bug 1195307 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "important", }, ], title: "CVE-2021-22600", }, { cve: "CVE-2021-39648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39648", }, ], notes: [ { category: "general", text: "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39648", url: "https://www.suse.com/security/cve/CVE-2021-39648", }, { category: "external", summary: "SUSE Bug 1193861 for CVE-2021-39648", url: "https://bugzilla.suse.com/1193861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2021-39648", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39685", }, ], notes: [ { category: "general", text: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39685", url: "https://www.suse.com/security/cve/CVE-2021-39685", }, { category: "external", summary: "SUSE Bug 1193802 for CVE-2021-39685", url: "https://bugzilla.suse.com/1193802", }, { category: "external", summary: "SUSE Bug 1194459 for CVE-2021-39685", url: "https://bugzilla.suse.com/1194459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "important", }, ], title: "CVE-2021-39685", }, { cve: "CVE-2021-45095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45095", }, ], notes: [ { category: "general", text: "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45095", url: "https://www.suse.com/security/cve/CVE-2021-45095", }, { category: "external", summary: "SUSE Bug 1193867 for CVE-2021-45095", url: "https://bugzilla.suse.com/1193867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2021-45095", }, { cve: "CVE-2022-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0286", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0286", url: "https://www.suse.com/security/cve/CVE-2022-0286", }, { category: "external", summary: "SUSE Bug 1195371 for CVE-2022-0286", url: "https://bugzilla.suse.com/1195371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2022-0286", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.76.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.76.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.76.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-21T12:51:27Z", details: "moderate", }, ], title: "CVE-2022-22942", }, ], }
suse-su-2022:0363-1
Vulnerability from csaf_suse
Published
2022-02-10 16:01
Modified
2022-02-10 16:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
The following security references were added to already fixed issues:
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
SUSE-2022-363,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).\n\n\nThe following security references were added to already fixed issues:\n\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-363,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-363", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0363-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0363-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220363-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0363-1", url: "https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1177599", url: "https://bugzilla.suse.com/1177599", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1185377", url: "https://bugzilla.suse.com/1185377", }, { category: "self", summary: "SUSE Bug 1187428", url: "https://bugzilla.suse.com/1187428", }, { category: "self", summary: "SUSE Bug 1187723", url: "https://bugzilla.suse.com/1187723", }, { category: "self", summary: "SUSE Bug 1188605", url: "https://bugzilla.suse.com/1188605", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1193096", url: "https://bugzilla.suse.com/1193096", }, { category: "self", summary: "SUSE Bug 1193506", url: "https://bugzilla.suse.com/1193506", }, { category: "self", summary: "SUSE Bug 1193767", url: "https://bugzilla.suse.com/1193767", }, { category: "self", summary: "SUSE Bug 1193802", url: "https://bugzilla.suse.com/1193802", }, { category: "self", summary: "SUSE Bug 1193861", url: "https://bugzilla.suse.com/1193861", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1193867", url: "https://bugzilla.suse.com/1193867", }, { category: "self", summary: "SUSE Bug 1194048", url: "https://bugzilla.suse.com/1194048", }, { category: "self", summary: "SUSE Bug 1194227", url: "https://bugzilla.suse.com/1194227", }, { category: "self", summary: "SUSE Bug 1194291", url: "https://bugzilla.suse.com/1194291", }, { category: "self", summary: "SUSE Bug 1194880", url: "https://bugzilla.suse.com/1194880", }, { category: "self", summary: "SUSE Bug 1195009", url: "https://bugzilla.suse.com/1195009", }, { category: "self", summary: "SUSE Bug 1195062", url: "https://bugzilla.suse.com/1195062", }, { category: "self", summary: "SUSE Bug 1195065", url: "https://bugzilla.suse.com/1195065", }, { category: "self", summary: "SUSE Bug 1195073", url: "https://bugzilla.suse.com/1195073", }, { category: "self", summary: "SUSE Bug 1195183", url: "https://bugzilla.suse.com/1195183", }, { category: "self", summary: "SUSE Bug 1195184", url: "https://bugzilla.suse.com/1195184", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195267", url: "https://bugzilla.suse.com/1195267", }, { category: "self", summary: "SUSE Bug 1195293", url: "https://bugzilla.suse.com/1195293", }, { category: "self", summary: "SUSE Bug 1195371", url: "https://bugzilla.suse.com/1195371", }, { category: "self", summary: "SUSE CVE CVE-2020-28097 page", url: "https://www.suse.com/security/cve/CVE-2020-28097/", }, { category: "self", summary: "SUSE CVE CVE-2021-22600 page", url: "https://www.suse.com/security/cve/CVE-2021-22600/", }, { category: "self", summary: "SUSE CVE CVE-2021-39648 page", url: "https://www.suse.com/security/cve/CVE-2021-39648/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39685 page", url: "https://www.suse.com/security/cve/CVE-2021-39685/", }, { category: "self", summary: "SUSE CVE CVE-2021-4159 page", url: "https://www.suse.com/security/cve/CVE-2021-4159/", }, { category: "self", summary: "SUSE CVE CVE-2021-44733 page", url: "https://www.suse.com/security/cve/CVE-2021-44733/", }, { category: "self", summary: "SUSE CVE CVE-2021-45095 page", url: "https://www.suse.com/security/cve/CVE-2021-45095/", }, { category: "self", summary: "SUSE CVE CVE-2022-0286 page", url: "https://www.suse.com/security/cve/CVE-2022-0286/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0435 page", url: "https://www.suse.com/security/cve/CVE-2022-0435/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-02-10T16:01:35Z", generator: { date: "2022-02-10T16:01:35Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0363-1", initial_release_date: "2022-02-10T16:01:35Z", revision_history: [ { date: "2022-02-10T16:01:35Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", product: { name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", product_id: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", product: { name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", product_id: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", product_id: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.40.4.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2020-28097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28097", }, ], notes: [ { category: "general", text: "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28097", url: "https://www.suse.com/security/cve/CVE-2020-28097", }, { category: "external", summary: "SUSE Bug 1187723 for CVE-2020-28097", url: "https://bugzilla.suse.com/1187723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2020-28097", }, { cve: "CVE-2021-22600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22600", }, ], notes: [ { category: "general", text: "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22600", url: "https://www.suse.com/security/cve/CVE-2021-22600", }, { category: "external", summary: "SUSE Bug 1195184 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195184", }, { category: "external", summary: "SUSE Bug 1195307 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "important", }, ], title: "CVE-2021-22600", }, { cve: "CVE-2021-39648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39648", }, ], notes: [ { category: "general", text: "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39648", url: "https://www.suse.com/security/cve/CVE-2021-39648", }, { category: "external", summary: "SUSE Bug 1193861 for CVE-2021-39648", url: "https://bugzilla.suse.com/1193861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2021-39648", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39685", }, ], notes: [ { category: "general", text: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39685", url: "https://www.suse.com/security/cve/CVE-2021-39685", }, { category: "external", summary: "SUSE Bug 1193802 for CVE-2021-39685", url: "https://bugzilla.suse.com/1193802", }, { category: "external", summary: "SUSE Bug 1194459 for CVE-2021-39685", url: "https://bugzilla.suse.com/1194459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "important", }, ], title: "CVE-2021-39685", }, { cve: "CVE-2021-4159", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4159", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4159", url: "https://www.suse.com/security/cve/CVE-2021-4159", }, { category: "external", summary: "SUSE Bug 1194227 for CVE-2021-4159", url: "https://bugzilla.suse.com/1194227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2021-4159", }, { cve: "CVE-2021-44733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44733", }, ], notes: [ { category: "general", text: "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44733", url: "https://www.suse.com/security/cve/CVE-2021-44733", }, { category: "external", summary: "SUSE Bug 1193767 for CVE-2021-44733", url: "https://bugzilla.suse.com/1193767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2021-44733", }, { cve: "CVE-2021-45095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45095", }, ], notes: [ { category: "general", text: "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45095", url: "https://www.suse.com/security/cve/CVE-2021-45095", }, { category: "external", summary: "SUSE Bug 1193867 for CVE-2021-45095", url: "https://bugzilla.suse.com/1193867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2021-45095", }, { cve: "CVE-2022-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0286", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0286", url: "https://www.suse.com/security/cve/CVE-2022-0286", }, { category: "external", summary: "SUSE Bug 1195371 for CVE-2022-0286", url: "https://bugzilla.suse.com/1195371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2022-0286", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0435", }, ], notes: [ { category: "general", text: "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0435", url: "https://www.suse.com/security/cve/CVE-2022-0435", }, { category: "external", summary: "SUSE Bug 1195254 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195254", }, { category: "external", summary: "SUSE Bug 1195308 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195308", }, { category: "external", summary: "SUSE Bug 1226672 for CVE-2022-0435", url: "https://bugzilla.suse.com/1226672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "important", }, ], title: "CVE-2022-0435", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:35Z", details: "moderate", }, ], title: "CVE-2022-22942", }, ], }
WID-SEC-W-2022-0112
Vulnerability from csaf_certbund
Published
2022-03-07 23:00
Modified
2024-07-03 22:00
Summary
Google Android: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0112 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0112.json", }, { category: "self", summary: "WID-SEC-2022-0112 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0112", }, { category: "external", summary: "Android Security Advisory vom 2022-03-07", url: "https://source.android.com/security/bulletin/2022-03-01", }, { category: "external", summary: "Android Pixel Security Advisory vom 2022-03-07", url: "https://source.android.com/security/bulletin/pixel/2022-03-01", }, { category: "external", summary: "inTheWild CVE-2021-39793", url: "https://inthewild.io/vuln/CVE-2021-39793", }, ], source_lang: "en-US", title: "Google Android: Mehrere Schwachstellen ermöglichen Privilegieneskalation", tracking: { current_release_date: "2024-07-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:37.968+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0112", initial_release_date: "2022-03-07T23:00:00.000+00:00", revision_history: [ { date: "2022-03-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-03-09T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-04-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-24T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-03T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-09T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-11T22:00:00.000+00:00", number: "7", summary: "Exploit-Status zu CVE-2021-39793 aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-14T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-19T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-10-18T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-16T23:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-24T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-07-03T22:00:00.000+00:00", number: "17", summary: "fehlgeleitete Linux Updates entfernt, CVSS korrigiert", }, ], status: "final", version: "17", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Google Android", product: { name: "Google Android", product_id: "132177", product_identification_helper: { cpe: "cpe:/o:google:android:-", }, }, }, ], category: "vendor", name: "Google", }, ], }, vulnerabilities: [ { cve: "CVE-2020-29368", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2020-29368", }, { cve: "CVE-2021-0957", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-0957", }, { cve: "CVE-2021-1942", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-1942", }, { cve: "CVE-2021-1950", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-1950", }, { cve: "CVE-2021-21781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-21781", }, { cve: "CVE-2021-25279", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25279", }, { cve: "CVE-2021-25478", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25478", }, { cve: "CVE-2021-25479", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25479", }, { cve: "CVE-2021-30299", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30299", }, { cve: "CVE-2021-30328", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30328", }, { cve: "CVE-2021-30329", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30329", }, { cve: "CVE-2021-30331", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30331", }, { cve: "CVE-2021-30332", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30332", }, { cve: "CVE-2021-30333", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30333", }, { cve: "CVE-2021-33624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-33624", }, { cve: "CVE-2021-35088", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35088", }, { cve: "CVE-2021-35103", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35103", }, { cve: "CVE-2021-35105", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35105", }, { cve: "CVE-2021-35106", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35106", }, { cve: "CVE-2021-35110", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35110", }, { cve: "CVE-2021-35117", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35117", }, { cve: "CVE-2021-3655", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-3655", }, { cve: "CVE-2021-37159", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-37159", }, { cve: "CVE-2021-39624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39624", }, { cve: "CVE-2021-39667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39667", }, { cve: "CVE-2021-39685", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39685", }, { cve: "CVE-2021-39686", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39686", }, { cve: "CVE-2021-39689", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39689", }, { cve: "CVE-2021-39690", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39690", }, { cve: "CVE-2021-39692", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39692", }, { cve: "CVE-2021-39693", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39693", }, { cve: "CVE-2021-39694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39694", }, { cve: "CVE-2021-39695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39695", }, { cve: "CVE-2021-39697", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39697", }, { cve: "CVE-2021-39698", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39698", }, { cve: "CVE-2021-39701", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39701", }, { cve: "CVE-2021-39702", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39702", }, { cve: "CVE-2021-39703", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39703", }, { cve: "CVE-2021-39704", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39704", }, { cve: "CVE-2021-39705", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39705", }, { cve: "CVE-2021-39706", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39706", }, { cve: "CVE-2021-39707", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39707", }, { cve: "CVE-2021-39708", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39708", }, { cve: "CVE-2021-39709", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39709", }, { cve: "CVE-2021-39710", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39710", }, { cve: "CVE-2021-39711", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39711", }, { cve: "CVE-2021-39712", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39712", }, { cve: "CVE-2021-39713", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39713", }, { cve: "CVE-2021-39714", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39714", }, { cve: "CVE-2021-39715", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39715", }, { cve: "CVE-2021-39716", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39716", }, { cve: "CVE-2021-39717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39717", }, { cve: "CVE-2021-39718", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39718", }, { cve: "CVE-2021-39719", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39719", }, { cve: "CVE-2021-39720", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39720", }, { cve: "CVE-2021-39721", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39721", }, { cve: "CVE-2021-39722", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39722", }, { cve: "CVE-2021-39723", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39723", }, { cve: "CVE-2021-39724", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39724", }, { cve: "CVE-2021-39725", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39725", }, { cve: "CVE-2021-39726", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39726", }, { cve: "CVE-2021-39727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39727", }, { cve: "CVE-2021-39729", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39729", }, { cve: "CVE-2021-39730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39730", }, { cve: "CVE-2021-39731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39731", }, { cve: "CVE-2021-39732", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39732", }, { cve: "CVE-2021-39733", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39733", }, { cve: "CVE-2021-39734", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39734", }, { cve: "CVE-2021-39735", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39735", }, { cve: "CVE-2021-39736", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39736", }, { cve: "CVE-2021-39737", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39737", }, { cve: "CVE-2021-39792", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39792", }, { cve: "CVE-2021-39793", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39793", }, { cve: "CVE-2021-41864", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-41864", }, { cve: "CVE-2021-43267", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-43267", }, { cve: "CVE-2021-43975", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-43975", }, { cve: "CVE-2022-20003", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20003", }, { cve: "CVE-2022-20047", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20047", }, { cve: "CVE-2022-20048", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20048", }, { cve: "CVE-2022-20053", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20053", }, ], }
wid-sec-w-2022-0112
Vulnerability from csaf_certbund
Published
2022-03-07 23:00
Modified
2024-07-03 22:00
Summary
Google Android: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0112 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0112.json", }, { category: "self", summary: "WID-SEC-2022-0112 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0112", }, { category: "external", summary: "Android Security Advisory vom 2022-03-07", url: "https://source.android.com/security/bulletin/2022-03-01", }, { category: "external", summary: "Android Pixel Security Advisory vom 2022-03-07", url: "https://source.android.com/security/bulletin/pixel/2022-03-01", }, { category: "external", summary: "inTheWild CVE-2021-39793", url: "https://inthewild.io/vuln/CVE-2021-39793", }, ], source_lang: "en-US", title: "Google Android: Mehrere Schwachstellen ermöglichen Privilegieneskalation", tracking: { current_release_date: "2024-07-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:37.968+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0112", initial_release_date: "2022-03-07T23:00:00.000+00:00", revision_history: [ { date: "2022-03-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-03-09T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-04-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-24T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-03T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-09T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-11T22:00:00.000+00:00", number: "7", summary: "Exploit-Status zu CVE-2021-39793 aufgenommen", }, { date: "2022-06-06T22:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-14T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-19T22:00:00.000+00:00", number: "10", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-21T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-10T22:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-10-18T22:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-16T23:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-06-24T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-07-03T22:00:00.000+00:00", number: "17", summary: "fehlgeleitete Linux Updates entfernt, CVSS korrigiert", }, ], status: "final", version: "17", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Google Android", product: { name: "Google Android", product_id: "132177", product_identification_helper: { cpe: "cpe:/o:google:android:-", }, }, }, ], category: "vendor", name: "Google", }, ], }, vulnerabilities: [ { cve: "CVE-2020-29368", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2020-29368", }, { cve: "CVE-2021-0957", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-0957", }, { cve: "CVE-2021-1942", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-1942", }, { cve: "CVE-2021-1950", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-1950", }, { cve: "CVE-2021-21781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-21781", }, { cve: "CVE-2021-25279", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25279", }, { cve: "CVE-2021-25478", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25478", }, { cve: "CVE-2021-25479", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-25479", }, { cve: "CVE-2021-30299", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30299", }, { cve: "CVE-2021-30328", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30328", }, { cve: "CVE-2021-30329", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30329", }, { cve: "CVE-2021-30331", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30331", }, { cve: "CVE-2021-30332", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30332", }, { cve: "CVE-2021-30333", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-30333", }, { cve: "CVE-2021-33624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-33624", }, { cve: "CVE-2021-35088", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35088", }, { cve: "CVE-2021-35103", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35103", }, { cve: "CVE-2021-35105", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35105", }, { cve: "CVE-2021-35106", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35106", }, { cve: "CVE-2021-35110", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35110", }, { cve: "CVE-2021-35117", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-35117", }, { cve: "CVE-2021-3655", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-3655", }, { cve: "CVE-2021-37159", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-37159", }, { cve: "CVE-2021-39624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39624", }, { cve: "CVE-2021-39667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39667", }, { cve: "CVE-2021-39685", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39685", }, { cve: "CVE-2021-39686", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39686", }, { cve: "CVE-2021-39689", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39689", }, { cve: "CVE-2021-39690", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39690", }, { cve: "CVE-2021-39692", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39692", }, { cve: "CVE-2021-39693", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39693", }, { cve: "CVE-2021-39694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39694", }, { cve: "CVE-2021-39695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39695", }, { cve: "CVE-2021-39697", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39697", }, { cve: "CVE-2021-39698", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39698", }, { cve: "CVE-2021-39701", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39701", }, { cve: "CVE-2021-39702", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39702", }, { cve: "CVE-2021-39703", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39703", }, { cve: "CVE-2021-39704", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39704", }, { cve: "CVE-2021-39705", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39705", }, { cve: "CVE-2021-39706", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39706", }, { cve: "CVE-2021-39707", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39707", }, { cve: "CVE-2021-39708", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39708", }, { cve: "CVE-2021-39709", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39709", }, { cve: "CVE-2021-39710", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39710", }, { cve: "CVE-2021-39711", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39711", }, { cve: "CVE-2021-39712", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39712", }, { cve: "CVE-2021-39713", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39713", }, { cve: "CVE-2021-39714", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39714", }, { cve: "CVE-2021-39715", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39715", }, { cve: "CVE-2021-39716", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39716", }, { cve: "CVE-2021-39717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39717", }, { cve: "CVE-2021-39718", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39718", }, { cve: "CVE-2021-39719", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39719", }, { cve: "CVE-2021-39720", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39720", }, { cve: "CVE-2021-39721", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39721", }, { cve: "CVE-2021-39722", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39722", }, { cve: "CVE-2021-39723", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39723", }, { cve: "CVE-2021-39724", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39724", }, { cve: "CVE-2021-39725", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39725", }, { cve: "CVE-2021-39726", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39726", }, { cve: "CVE-2021-39727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39727", }, { cve: "CVE-2021-39729", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39729", }, { cve: "CVE-2021-39730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39730", }, { cve: "CVE-2021-39731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39731", }, { cve: "CVE-2021-39732", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39732", }, { cve: "CVE-2021-39733", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39733", }, { cve: "CVE-2021-39734", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39734", }, { cve: "CVE-2021-39735", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39735", }, { cve: "CVE-2021-39736", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39736", }, { cve: "CVE-2021-39737", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39737", }, { cve: "CVE-2021-39792", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39792", }, { cve: "CVE-2021-39793", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-39793", }, { cve: "CVE-2021-41864", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-41864", }, { cve: "CVE-2021-43267", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-43267", }, { cve: "CVE-2021-43975", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2021-43975", }, { cve: "CVE-2022-20003", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20003", }, { cve: "CVE-2022-20047", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20047", }, { cve: "CVE-2022-20048", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20048", }, { cve: "CVE-2022-20053", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Google Android. Sie bestehen in den Komponenten Runtime, Framework, Media Framework, System, Google Play System-Updates, Kernel, MediaTek, Qualcomm, Qualcomm closed-source und Pixel. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erhöhen, vertrauliche Informationen offenzulegen, beliebigen Code zur Ausführung zu bringen und einen Denial-of-Service-Zustand auszulösen.", }, ], product_status: { known_affected: [ "132177", ], }, release_date: "2022-03-07T23:00:00.000+00:00", title: "CVE-2022-20053", }, ], }
fkie_cve-2021-39685
Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 06:20
Severity ?
Summary
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
References
▼ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/2022-03-01 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2022-03-01 | Patch, Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", }, { lang: "es", value: "En varios métodos de configuración del subsistema de gadgets USB, se presenta una posible escritura fuera de límites debido a una comprobación incorrecta de flag. Esto podría conllevar a una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. Producto: Android, Versiones: Android kernel, ID de Android: A-210292376, Referencias: kernel Ascendente", }, ], id: "CVE-2021-39685", lastModified: "2024-11-21T06:20:00.253", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-16T15:15:10.377", references: [ { source: "security@android.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2022-03-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2022-03-01", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
opensuse-su-2022:0363-1
Vulnerability from csaf_opensuse
Published
2022-02-10 16:01
Modified
2022-02-10 16:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
The following security references were added to already fixed issues:
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
openSUSE-SLE-15.3-2022-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).\n\n\nThe following security references were added to already fixed issues:\n\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2022-363", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0363-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:0363-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:0363-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1177599", url: "https://bugzilla.suse.com/1177599", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1185377", url: "https://bugzilla.suse.com/1185377", }, { category: "self", summary: "SUSE Bug 1187428", url: "https://bugzilla.suse.com/1187428", }, { category: "self", summary: "SUSE Bug 1187723", url: "https://bugzilla.suse.com/1187723", }, { category: "self", summary: "SUSE Bug 1188605", url: "https://bugzilla.suse.com/1188605", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1193096", url: "https://bugzilla.suse.com/1193096", }, { category: "self", summary: "SUSE Bug 1193506", url: "https://bugzilla.suse.com/1193506", }, { category: "self", summary: "SUSE Bug 1193767", url: "https://bugzilla.suse.com/1193767", }, { category: "self", summary: "SUSE Bug 1193802", url: "https://bugzilla.suse.com/1193802", }, { category: "self", summary: "SUSE Bug 1193861", url: "https://bugzilla.suse.com/1193861", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1193867", url: "https://bugzilla.suse.com/1193867", }, { category: "self", summary: "SUSE Bug 1194048", url: "https://bugzilla.suse.com/1194048", }, { category: "self", summary: "SUSE Bug 1194227", url: "https://bugzilla.suse.com/1194227", }, { category: "self", summary: "SUSE Bug 1194291", url: "https://bugzilla.suse.com/1194291", }, { category: "self", summary: "SUSE Bug 1194880", url: "https://bugzilla.suse.com/1194880", }, { category: "self", summary: "SUSE Bug 1195009", url: "https://bugzilla.suse.com/1195009", }, { category: "self", summary: "SUSE Bug 1195062", url: "https://bugzilla.suse.com/1195062", }, { category: "self", summary: "SUSE Bug 1195065", url: "https://bugzilla.suse.com/1195065", }, { category: "self", summary: "SUSE Bug 1195073", url: "https://bugzilla.suse.com/1195073", }, { category: "self", summary: "SUSE Bug 1195183", url: "https://bugzilla.suse.com/1195183", }, { category: "self", summary: "SUSE Bug 1195184", url: "https://bugzilla.suse.com/1195184", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195267", url: "https://bugzilla.suse.com/1195267", }, { category: "self", summary: "SUSE Bug 1195293", url: "https://bugzilla.suse.com/1195293", }, { category: "self", summary: "SUSE Bug 1195371", url: "https://bugzilla.suse.com/1195371", }, { category: "self", summary: "SUSE CVE CVE-2020-28097 page", url: "https://www.suse.com/security/cve/CVE-2020-28097/", }, { category: "self", summary: "SUSE CVE CVE-2021-22600 page", url: "https://www.suse.com/security/cve/CVE-2021-22600/", }, { category: "self", summary: "SUSE CVE CVE-2021-39648 page", url: "https://www.suse.com/security/cve/CVE-2021-39648/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39685 page", url: "https://www.suse.com/security/cve/CVE-2021-39685/", }, { category: "self", summary: "SUSE CVE CVE-2021-4159 page", url: "https://www.suse.com/security/cve/CVE-2021-4159/", }, { category: "self", summary: "SUSE CVE CVE-2021-44733 page", url: "https://www.suse.com/security/cve/CVE-2021-44733/", }, { category: "self", summary: "SUSE CVE CVE-2021-45095 page", url: "https://www.suse.com/security/cve/CVE-2021-45095/", }, { category: "self", summary: "SUSE CVE CVE-2022-0286 page", url: "https://www.suse.com/security/cve/CVE-2022-0286/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0435 page", url: "https://www.suse.com/security/cve/CVE-2022-0435/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-02-10T16:01:36Z", generator: { date: "2022-02-10T16:01:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:0363-1", initial_release_date: "2022-02-10T16:01:36Z", revision_history: [ { date: "2022-02-10T16:01:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", product: { name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", product_id: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", product: { name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", product_id: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", product: { name: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", product_id: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", product_id: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.40.4.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", }, product_reference: "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2020-28097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28097", }, ], notes: [ { category: "general", text: "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28097", url: "https://www.suse.com/security/cve/CVE-2020-28097", }, { category: "external", summary: "SUSE Bug 1187723 for CVE-2020-28097", url: "https://bugzilla.suse.com/1187723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2020-28097", }, { cve: "CVE-2021-22600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22600", }, ], notes: [ { category: "general", text: "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22600", url: "https://www.suse.com/security/cve/CVE-2021-22600", }, { category: "external", summary: "SUSE Bug 1195184 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195184", }, { category: "external", summary: "SUSE Bug 1195307 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "important", }, ], title: "CVE-2021-22600", }, { cve: "CVE-2021-39648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39648", }, ], notes: [ { category: "general", text: "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39648", url: "https://www.suse.com/security/cve/CVE-2021-39648", }, { category: "external", summary: "SUSE Bug 1193861 for CVE-2021-39648", url: "https://bugzilla.suse.com/1193861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2021-39648", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39685", }, ], notes: [ { category: "general", text: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39685", url: "https://www.suse.com/security/cve/CVE-2021-39685", }, { category: "external", summary: "SUSE Bug 1193802 for CVE-2021-39685", url: "https://bugzilla.suse.com/1193802", }, { category: "external", summary: "SUSE Bug 1194459 for CVE-2021-39685", url: "https://bugzilla.suse.com/1194459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "important", }, ], title: "CVE-2021-39685", }, { cve: "CVE-2021-4159", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4159", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4159", url: "https://www.suse.com/security/cve/CVE-2021-4159", }, { category: "external", summary: "SUSE Bug 1194227 for CVE-2021-4159", url: "https://bugzilla.suse.com/1194227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2021-4159", }, { cve: "CVE-2021-44733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44733", }, ], notes: [ { category: "general", text: "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44733", url: "https://www.suse.com/security/cve/CVE-2021-44733", }, { category: "external", summary: "SUSE Bug 1193767 for CVE-2021-44733", url: "https://bugzilla.suse.com/1193767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2021-44733", }, { cve: "CVE-2021-45095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45095", }, ], notes: [ { category: "general", text: "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45095", url: "https://www.suse.com/security/cve/CVE-2021-45095", }, { category: "external", summary: "SUSE Bug 1193867 for CVE-2021-45095", url: "https://bugzilla.suse.com/1193867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2021-45095", }, { cve: "CVE-2022-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0286", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0286", url: "https://www.suse.com/security/cve/CVE-2022-0286", }, { category: "external", summary: "SUSE Bug 1195371 for CVE-2022-0286", url: "https://bugzilla.suse.com/1195371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2022-0286", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0435", }, ], notes: [ { category: "general", text: "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0435", url: "https://www.suse.com/security/cve/CVE-2022-0435", }, { category: "external", summary: "SUSE Bug 1195254 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195254", }, { category: "external", summary: "SUSE Bug 1195308 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195308", }, { category: "external", summary: "SUSE Bug 1226672 for CVE-2022-0435", url: "https://bugzilla.suse.com/1226672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "important", }, ], title: "CVE-2022-0435", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-10T16:01:36Z", details: "moderate", }, ], title: "CVE-2022-22942", }, ], }
opensuse-su-2022:0370-1
Vulnerability from csaf_opensuse
Published
2022-02-11 07:35
Modified
2022-02-11 07:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Bluetooth: refactor malicious adv data check (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: refactor ns->ctrl by request (git-fixes).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: Add support for Brainboxes UC cards (git-fixes).
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
openSUSE-SLE-15.3-2022-370,openSUSE-SLE-15.4-2022-370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Bluetooth: refactor malicious adv data check (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- IB/cm: Avoid a loop when device has 255 ports (git-fixes)\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/isert: Fix a use after free in isert_connect_request (git-fixes)\n- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)\n- IB/mlx5: Add missing error code (git-fixes)\n- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)\n- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)\n- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- Input: wm97xx: Simplify resource management (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)\n- RDMA/core: Fix corrupted SL on passive side (git-fixes)\n- RDMA/core: Unify RoCE check and re-factor code (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)\n- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)\n- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)\n- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)\n- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)\n- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)\n- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)\n- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)\n- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)\n- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)\n- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)\n- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: serial: mos7840: fix probe error handling (git-fixes).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).\n- blk-mq: introduce blk_mq_set_request_complete (git-fixes).\n- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).\n- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- i40iw: Add support to make destroy QP synchronous (git-fixes)\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).\n- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).\n- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).\n- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).\n- nvme-tcp: fix data digest pointer calculation (git-fixes).\n- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).\n- nvme-tcp: fix memory leak when freeing a queue (git-fixes).\n- nvme-tcp: fix possible use-after-completion (git-fixes).\n- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).\n- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).\n- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).\n- nvme: introduce a nvme_host_path_error helper (git-fixes).\n- nvme: refactor ns->ctrl by request (git-fixes).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).\n- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).\n- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: Add support for Brainboxes UC cards (git-fixes).\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).\n- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).\n- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2022-370,openSUSE-SLE-15.4-2022-370", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0370-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:0370-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:0370-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1176447", url: "https://bugzilla.suse.com/1176447", }, { category: "self", summary: "SUSE Bug 1177599", url: "https://bugzilla.suse.com/1177599", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1185377", url: "https://bugzilla.suse.com/1185377", }, { category: "self", summary: "SUSE Bug 1187428", url: "https://bugzilla.suse.com/1187428", }, { category: "self", summary: "SUSE Bug 1187723", url: "https://bugzilla.suse.com/1187723", }, { category: "self", summary: "SUSE Bug 1188605", url: "https://bugzilla.suse.com/1188605", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1193096", url: "https://bugzilla.suse.com/1193096", }, { category: "self", summary: "SUSE Bug 1193506", url: "https://bugzilla.suse.com/1193506", }, { category: "self", summary: "SUSE Bug 1193767", url: "https://bugzilla.suse.com/1193767", }, { category: "self", summary: "SUSE Bug 1193802", url: "https://bugzilla.suse.com/1193802", }, { category: "self", summary: "SUSE Bug 1193861", url: "https://bugzilla.suse.com/1193861", }, { category: "self", summary: "SUSE Bug 1193864", url: "https://bugzilla.suse.com/1193864", }, { category: "self", summary: "SUSE Bug 1193867", url: "https://bugzilla.suse.com/1193867", }, { category: "self", summary: "SUSE Bug 1194048", url: "https://bugzilla.suse.com/1194048", }, { category: "self", summary: "SUSE Bug 1194227", url: "https://bugzilla.suse.com/1194227", }, { category: "self", summary: "SUSE Bug 1194291", url: "https://bugzilla.suse.com/1194291", }, { category: "self", summary: "SUSE Bug 1194880", url: "https://bugzilla.suse.com/1194880", }, { category: "self", summary: "SUSE Bug 1195009", url: "https://bugzilla.suse.com/1195009", }, { category: "self", summary: "SUSE Bug 1195062", url: "https://bugzilla.suse.com/1195062", }, { category: "self", summary: "SUSE Bug 1195065", url: "https://bugzilla.suse.com/1195065", }, { category: "self", summary: "SUSE Bug 1195073", url: "https://bugzilla.suse.com/1195073", }, { category: "self", summary: "SUSE Bug 1195183", url: "https://bugzilla.suse.com/1195183", }, { category: "self", summary: "SUSE Bug 1195184", url: "https://bugzilla.suse.com/1195184", }, { category: "self", summary: "SUSE Bug 1195254", url: "https://bugzilla.suse.com/1195254", }, { category: "self", summary: "SUSE Bug 1195267", url: "https://bugzilla.suse.com/1195267", }, { category: "self", summary: "SUSE Bug 1195293", url: "https://bugzilla.suse.com/1195293", }, { category: "self", summary: "SUSE Bug 1195371", url: "https://bugzilla.suse.com/1195371", }, { category: "self", summary: "SUSE Bug 1195476", url: "https://bugzilla.suse.com/1195476", }, { category: "self", summary: "SUSE Bug 1195477", url: "https://bugzilla.suse.com/1195477", }, { category: "self", summary: "SUSE Bug 1195478", url: "https://bugzilla.suse.com/1195478", }, { category: "self", summary: "SUSE Bug 1195479", url: "https://bugzilla.suse.com/1195479", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195481", url: "https://bugzilla.suse.com/1195481", }, { category: "self", summary: "SUSE Bug 1195482", url: "https://bugzilla.suse.com/1195482", }, { category: "self", summary: "SUSE CVE CVE-2020-28097 page", url: "https://www.suse.com/security/cve/CVE-2020-28097/", }, { category: "self", summary: "SUSE CVE CVE-2021-22600 page", url: "https://www.suse.com/security/cve/CVE-2021-22600/", }, { category: "self", summary: "SUSE CVE CVE-2021-39648 page", url: "https://www.suse.com/security/cve/CVE-2021-39648/", }, { category: "self", summary: "SUSE CVE CVE-2021-39657 page", url: "https://www.suse.com/security/cve/CVE-2021-39657/", }, { category: "self", summary: "SUSE CVE CVE-2021-39685 page", url: "https://www.suse.com/security/cve/CVE-2021-39685/", }, { category: "self", summary: "SUSE CVE CVE-2021-44733 page", url: "https://www.suse.com/security/cve/CVE-2021-44733/", }, { category: "self", summary: "SUSE CVE CVE-2021-45095 page", url: "https://www.suse.com/security/cve/CVE-2021-45095/", }, { category: "self", summary: "SUSE CVE CVE-2022-0286 page", url: "https://www.suse.com/security/cve/CVE-2022-0286/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0435 page", url: "https://www.suse.com/security/cve/CVE-2022-0435/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-02-11T07:35:45Z", generator: { date: "2022-02-11T07:35:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:0370-1", initial_release_date: "2022-02-11T07:35:45Z", revision_history: [ { date: "2022-02-11T07:35:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-al-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-al-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-altera-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-amd-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-apm-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-arm-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-lg-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.49.1.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.49.1.aarch64", product_id: "dtb-zte-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.49.1.aarch64", product_id: "kernel-syms-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-devel-5.3.18-150300.59.49.1.noarch", product_id: "kernel-devel-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-docs-5.3.18-150300.59.49.1.noarch", product_id: "kernel-docs-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-macros-5.3.18-150300.59.49.1.noarch", product_id: "kernel-macros-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-source-5.3.18-150300.59.49.1.noarch", product_id: "kernel-source-5.3.18-150300.59.49.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-syms-5.3.18-150300.59.49.1.s390x", product_id: "kernel-syms-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.49.1.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.49.1.x86_64", product_id: "kernel-syms-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-al-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-al-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-allwinner-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-altera-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-amd-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-amlogic-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-apm-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-arm-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-broadcom-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-cavium-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-exynos-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-freescale-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-lg-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-marvell-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-mediatek-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-nvidia-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-qcom-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-renesas-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-rockchip-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-socionext-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-sprd-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-xilinx-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-zte-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", }, product_reference: "dtb-zte-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-debug-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-debug-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-extra-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-default-optional-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-docs-html-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", }, product_reference: "kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2020-28097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28097", }, ], notes: [ { category: "general", text: "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28097", url: "https://www.suse.com/security/cve/CVE-2020-28097", }, { category: "external", summary: "SUSE Bug 1187723 for CVE-2020-28097", url: "https://bugzilla.suse.com/1187723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2020-28097", }, { cve: "CVE-2021-22600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-22600", }, ], notes: [ { category: "general", text: "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-22600", url: "https://www.suse.com/security/cve/CVE-2021-22600", }, { category: "external", summary: "SUSE Bug 1195184 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195184", }, { category: "external", summary: "SUSE Bug 1195307 for CVE-2021-22600", url: "https://bugzilla.suse.com/1195307", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "important", }, ], title: "CVE-2021-22600", }, { cve: "CVE-2021-39648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39648", }, ], notes: [ { category: "general", text: "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39648", url: "https://www.suse.com/security/cve/CVE-2021-39648", }, { category: "external", summary: "SUSE Bug 1193861 for CVE-2021-39648", url: "https://bugzilla.suse.com/1193861", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2021-39648", }, { cve: "CVE-2021-39657", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39657", }, ], notes: [ { category: "general", text: "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39657", url: "https://www.suse.com/security/cve/CVE-2021-39657", }, { category: "external", summary: "SUSE Bug 1193864 for CVE-2021-39657", url: "https://bugzilla.suse.com/1193864", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "low", }, ], title: "CVE-2021-39657", }, { cve: "CVE-2021-39685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-39685", }, ], notes: [ { category: "general", text: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-39685", url: "https://www.suse.com/security/cve/CVE-2021-39685", }, { category: "external", summary: "SUSE Bug 1193802 for CVE-2021-39685", url: "https://bugzilla.suse.com/1193802", }, { category: "external", summary: "SUSE Bug 1194459 for CVE-2021-39685", url: "https://bugzilla.suse.com/1194459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "important", }, ], title: "CVE-2021-39685", }, { cve: "CVE-2021-44733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-44733", }, ], notes: [ { category: "general", text: "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-44733", url: "https://www.suse.com/security/cve/CVE-2021-44733", }, { category: "external", summary: "SUSE Bug 1193767 for CVE-2021-44733", url: "https://bugzilla.suse.com/1193767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2021-44733", }, { cve: "CVE-2021-45095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45095", }, ], notes: [ { category: "general", text: "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45095", url: "https://www.suse.com/security/cve/CVE-2021-45095", }, { category: "external", summary: "SUSE Bug 1193867 for CVE-2021-45095", url: "https://bugzilla.suse.com/1193867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2021-45095", }, { cve: "CVE-2022-0286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0286", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0286", url: "https://www.suse.com/security/cve/CVE-2022-0286", }, { category: "external", summary: "SUSE Bug 1195371 for CVE-2022-0286", url: "https://bugzilla.suse.com/1195371", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2022-0286", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0435", }, ], notes: [ { category: "general", text: "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0435", url: "https://www.suse.com/security/cve/CVE-2022-0435", }, { category: "external", summary: "SUSE Bug 1195254 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195254", }, { category: "external", summary: "SUSE Bug 1195308 for CVE-2022-0435", url: "https://bugzilla.suse.com/1195308", }, { category: "external", summary: "SUSE Bug 1226672 for CVE-2022-0435", url: "https://bugzilla.suse.com/1226672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "important", }, ], title: "CVE-2022-0435", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.49.1.150300.18.31.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.49.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.49.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.49.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-02-11T07:35:45Z", details: "moderate", }, ], title: "CVE-2022-22942", }, ], }
gsd-2021-39685
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
Aliases
Aliases
{ GSD: { alias: "CVE-2021-39685", description: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", id: "GSD-2021-39685", references: [ "https://www.suse.com/security/cve/CVE-2021-39685.html", "https://www.debian.org/security/2022/dsa-5050", "https://www.debian.org/security/2022/dsa-5096", "https://ubuntu.com/security/CVE-2021-39685", "https://advisories.mageia.org/CVE-2021-39685.html", "https://linux.oracle.com/cve/CVE-2021-39685.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-39685", ], details: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", id: "GSD-2021-39685", modified: "2023-12-13T01:23:15.341628Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-39685", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Android kernel", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/2022-03-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/2022-03-01", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2021-39685", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/2022-03-01", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2022-03-01", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2022-03-23T16:20Z", publishedDate: "2022-03-16T15:15Z", }, }, }
ghsa-wf5m-qxcp-g2hf
Vulnerability from github
Published
2022-03-17 00:00
Modified
2022-03-24 00:00
Severity ?
Details
In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
{ affected: [], aliases: [ "CVE-2021-39685", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-03-16T15:15:00Z", severity: "HIGH", }, details: "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", id: "GHSA-wf5m-qxcp-g2hf", modified: "2022-03-24T00:00:41Z", published: "2022-03-17T00:00:43Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-39685", }, { type: "WEB", url: "https://source.android.com/security/bulletin/2022-03-01", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.